QUESTIONS WITH ANSWERS
Random Scanning - CORRECT ANSWERS ✔✔Each comprised
computer probes random addresses
Permutation Scanning - CORRECT ANSWERS ✔✔All comprised
computers share a common psuedo-random permutation of the IP
address space
Signpost Scanning - CORRECT ANSWERS ✔✔Uses the
communication patterns of the comprised computer to find a new
target
Hit List Scanning - CORRECT ANSWERS ✔✔A portion of a list of
targets is supplied to a comprised computer
Subnet Spoofing - CORRECT ANSWERS ✔✔Generate random
addresses within a given address space
Random Spoofing - CORRECT ANSWERS ✔✔Generate 32-bit
numbers and stamp packets with them
,Fixed Spoofing - CORRECT ANSWERS ✔✔The spoofed address is
the address of the target
Server Application - CORRECT ANSWERS ✔✔The attack is targeted
to a specific application on a server
Network Access - CORRECT ANSWERS ✔✔The attack is used to
overload or crash the communication mechanism of a network
Infrastructure - CORRECT ANSWERS ✔✔The motivation of this
attack is a crucial service of a global internet operation, for example
core router
DoS Bug (Amplification Attack) - CORRECT ANSWERS ✔✔Design
flaw allowing one machine to disrupt a service
DoS Flood (Amplification Attack) - CORRECT ANSWERS
✔✔Command botnets to generate flood of requests
UDP-based NTP - CORRECT ANSWERS ✔✔-Particularly vulnerable
to amplification attacks
-Small command can generate a large response
,-Vulnerable to source IP spoofing
-Difficult to ensure computers only communicate with legitimate
NTP servers
IP Header Format - CORRECT ANSWERS ✔✔-Connectionless
-Unreliable
-No authentication
SYN Flood - CORRECT ANSWERS ✔✔A type of DoS where an
attacker sends a large amount of SYN request packets to a server in
an attempt to deny service.
SYN Flood Mitigations - CORRECT ANSWERS ✔✔Syn Cookies -
remove state from server, but incur performance overhead
Crowdturfers - CORRECT ANSWERS ✔✔- Crowdsource to create,
verify, and manage fake accounts
- Solve CAPTCHAs
Penetration Testing - CORRECT ANSWERS ✔✔Footprinting,
Scanning, Enumeration, Gaining Access, Escalating Privileged,
Pilfering (steal data), Covering Tracks, Creating Backdoors
, NS Record - CORRECT ANSWERS ✔✔Points to other server
A Record - CORRECT ANSWERS ✔✔Contains IP Address
MX - CORRECT ANSWERS ✔✔Address in charge of handling email
TXT - CORRECT ANSWERS ✔✔Generic text; distribute site public
keys
DNS vulnerabilities - CORRECT ANSWERS ✔✔- Users/hosts trust
the host-address mapping provided by DNS
- Interception of requests or compromise of DNS servers
- Few use DNSsec
- Cache poisining
Cache Poisoning - CORRECT ANSWERS ✔✔Corrupting an Internet
server's DNS table by replacing an Internet address with that of
another, rogue address. When a Web user seeks the page with that
address, the request is redirected by the rogue entry in the table to a
different address. At that point, a worm, spyware, Web browser
hijacking program, or other malware can be downloaded to the user's
computer from the rogue location.